Tagged Questions

The Advanced Encryption Standard (AES) is a symmetric-key encryption standard adopted by the U.S. government. The standard comprises three block ciphers, AES-128, AES-192 and AES-256, adopted from a larger collection originally published as Rijndael.

Is there any instance of NIST or other encryption standards using AES-CCM to encrypt/authenticate key data? I would like to use CCM over a keywrap function, but cannot find any precedent for this in ...

A 256 bit AES key is required to be broken using the brute force method on a 2GHz computer.
How long would it take to break the key in the best case and in the worst case situations? Assume that 1000 ...

I'm working on an embedded project that needs to communicate with a server. Both the server and the device have an AES key pre-installed.
I have a network device that provides http services but not ...

For quite a while I've been experimentally hacking wireless routers by capturing handshakes and Decrypting them using oclHashcat on my computer. even the most complicated passwords won't take longer ...

It is fairly well known that on Windows, when you delete a file (or folder which may contain any number of files and subfolders possibly containing other files and subfolders and so on), Windows just ...

For AES based encryption on TCP/IP connections, I am guessing I have to do the following:
Have the 2 parties share a common key, assuming I am doing AES-128 then a sequence of 16 bytes. Ideally the ...

I'm trying to figure out how a given executable works. I know it's using AES-128 to encrypt and decrypt, but the specifics of the code are unknown. I can get the executable to encrypt and decrypt any ...

Given that two clients want to sync data through a server, is it safe to use AES to encrypt the data and TLS to communicate with the server?
Assumptions:
Server has never access to unencrypted data ...

An active attacker changes the ciphertext which was made using the AES cipher algorithm.
Which message properties are preserved even though that change was made. Choose one of the below:
1) Integrity ...

I understand PCI DSS 3.0 allows hashes of cardnumbers to be stored separately from encrypted values, but I'm startled at the efficiency of tools like hashcat in discovering card numbers from hashed ...

I was wondering if an adversary have your private gpg key but not the password/phrase, how easy/difficult would it be to crack a encrypted file compared to a encryption that only use password and not ...

I'm not very familiar with encryption and new to this, I'm just learning it right now by code review of one of the class we have in an application to encrypt a password using AES. Would anyone explain ...

I'm hoping to use the below issue we came across recently to better understand Java's security providers, ciphers and encryption in general.
We got the following error during an SSL Handshake (using ...

I am writing a paper on reducing the power consumption of security protocols. I am having trouble identifying sources that describe real-time usage of DES and AES, and how often they are used. I plan ...

I got a little problem regarding AES decryption. I have to decrypt some text that has been encrypted using 128bit AES / ECB with PHP mcrypt. The thing is, the key that is being used to encrypt/decrypt ...

I got a Microsoft Sculpt keyboard, as it seems to be a small improvement over the much loved Ergo 4000. (What I'd give to have an Ergo 4000 with CheryMX Blues...)
On various sites, they have this one ...

I'm building an application with NFC which is a wireless communication protocol. An attacker can modify bits in a wireless communication protocol. I want to prevent this. I know we can't prevent an ...

I found out that an encryption tool encrypts and stores the passphrase entered by the user and used to generate the AES key in addition of the encrypted payload.
Pseudocode:
key = md5(passphrase)
iv ...

I'm currently using AES 256 for the encryption of my web application and the security policy context specifies that the encryption key must be replaced once every few months.
When that happens what ...

I am encrypting text files using AES256 (no particular reason, that can easily be changed). Before granting access to a file, I need to verify if a party knows the correct key, but without necessarily ...

For security purposes I need to use AES encryption and SHA256/512 in my Django/Python project. I know there are various libraries out there that provide different encryption methods but I can't seem ...